Vulnerability
CVE-2020-24587
Component: WIFI
Location: OS
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
Impact
Severity (Manufact.)
HIGH
Severity (NIST)
2.6
Severity (Android)
N/A
Chipsets
17
Devices
658
Affected Hardware
Name | Also known as | Manufacturer |
---|---|---|
MSM8208 | Snapdragon 208 | Qualcomm |
MSM8917 | Snapdragon 425 | Qualcomm |
MSM8940 | Snapdragon 435 | Qualcomm |
MSM8952 | Snapdragon 617 | Qualcomm |
MSM8953 | Snapdragon 625 | Qualcomm |
SDM630 | Snapdragon 630 | Qualcomm |
SDM636 | Snapdragon 636 | Qualcomm |
MSM8956 | Snapdragon 650 | Qualcomm |
MSM8976 | Snapdragon 652 | Qualcomm |
SM6150 | Snapdragon 675 | Qualcomm |
17 of 17 row(s) shown.
Rows per page
Page 1 of 2
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.
Timeline
Introduced (est):
Jan 1, 2014
Reported:
Dec 13, 2020
Advisory Published:
Aug 2, 2021
CVE Published:
May 11, 2021
Android Patch Level:
Oct 2021